www.proofpoint.com Open in urlscan Pro
2a02:e980:107::cf  Public Scan

Submitted URL: http://www.proofpoint.com/au/events/protect
Effective URL: https://www.proofpoint.com/au/events/protect
Submission: On March 28 via api from IE — Scanned from DE

Form analysis 3 forms found in the DOM

/au

<form action="/au" data-region="us" data-language="en">
  <input type="text" name="search_block_form" placeholder="Search">
  <input type="submit">
</form>

<form id="mktoForm_13526" data-mkto-id="13526" data-mkto-base="//app-abj.marketo.com" data-munchkin-id="309-RHV-619" data-submit-text="" data-redirect-link="https://www.proofpoint.com/uk/events/protect/thank-you" data-prefill="" data-event-label=""
  class="mk-form__form marketo-form-block__form mktoForm mktoHasWidth mktoLayoutLeft js-visible mkto-form-processed" novalidate="novalidate" style="font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); width: 1601px;">
  <style type="text/css"></style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="FirstName" id="LblFirstName" class="mktoLabel mktoHasWidth" style="width: 150px;">
          <div class="mktoAsterix">*</div>First Name
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="FirstName" name="FirstName" placeholder="First Name *" maxlength="255" aria-labelledby="LblFirstName InstructFirstName" type="text"
          class="mktoField mktoTextField mktoHasWidth mktoRequired" aria-required="true" style="width: 150px;"><span id="InstructFirstName" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="LastName" id="LblLastName" class="mktoLabel mktoHasWidth" style="width: 150px;">
          <div class="mktoAsterix">*</div>Last Name
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="LastName" name="LastName" placeholder="Last Name *" maxlength="255" aria-labelledby="LblLastName InstructLastName" type="text"
          class="mktoField mktoTextField mktoHasWidth mktoRequired" aria-required="true" style="width: 150px;"><span id="InstructLastName" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 150px;">
          <div class="mktoAsterix">*</div>Business Email
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="Email" name="Email" placeholder="Business Email *" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email"
          class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 150px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Company" id="LblCompany" class="mktoLabel mktoHasWidth" style="width: 150px;">
          <div class="mktoAsterix">*</div>Company Name
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="Company" name="Company" placeholder="Company Name *" maxlength="255" aria-labelledby="LblCompany InstructCompany" type="text"
          class="mktoField mktoTextField mktoHasWidth mktoRequired" aria-required="true" style="width: 150px;" value="Lake Solutions AG"><span id="InstructCompany" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Title" id="LblTitle" class="mktoLabel mktoHasWidth" style="width: 150px;">
          <div class="mktoAsterix">*</div>Job Title
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="Title" name="Title" placeholder="Job Title *" maxlength="255" aria-labelledby="LblTitle InstructTitle" type="text"
          class="mktoField mktoTextField mktoHasWidth mktoRequired" aria-required="true" style="width: 150px;"><span id="InstructTitle" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap mktoRequiredField">
        <div class="mk-form__select"><label for="Country" id="LblCountry" class="mktoLabel mktoHasWidth" style="width: 150px;">
            <div class="mktoAsterix">*</div>Country:
          </label><select id="Country" name="Country" aria-labelledby="LblCountry InstructCountry" class="mktoField mktoHasWidth mktoRequired mk-form--initialized" aria-required="true" style="width: 150px;">
            <option value="">Country *</option>
            <option value="United States">United States</option>
            <option value="Afghanistan">Afghanistan</option>
            <option value="Albania">Albania</option>
            <option value="Algeria">Algeria</option>
            <option value="Andorra">Andorra</option>
            <option value="Angola">Angola</option>
            <option value="Antigua and Barbuda">Antigua and Barbuda</option>
            <option value="Argentina">Argentina</option>
            <option value="Armenia">Armenia</option>
            <option value="Aruba">Aruba</option>
            <option value="Australia">Australia</option>
            <option value="Austria">Austria</option>
            <option value="Azerbaijan">Azerbaijan</option>
            <option value="Bahamas, The">Bahamas, The</option>
            <option value="Bahrain">Bahrain</option>
            <option value="Bangladesh">Bangladesh</option>
            <option value="Barbados">Barbados</option>
            <option value="Belarus">Belarus</option>
            <option value="Belgium">Belgium</option>
            <option value="Belize">Belize</option>
            <option value="Benin">Benin</option>
            <option value="Bhutan">Bhutan</option>
            <option value="Bolivia">Bolivia</option>
            <option value="Bosnia and Herzegovina">Bosnia and Herzegovina</option>
            <option value="Botswana">Botswana</option>
            <option value="Brazil">Brazil</option>
            <option value="Brunei">Brunei&nbsp;</option>
            <option value="Bulgaria">Bulgaria</option>
            <option value="Burkina Faso">Burkina Faso</option>
            <option value="Burma">Burma</option>
            <option value="Burundi">Burundi</option>
            <option value="Cambodia">Cambodia</option>
            <option value="Cameroon">Cameroon</option>
            <option value="Canada">Canada</option>
            <option value="Cape Verde">Cape Verde</option>
            <option value="Central African Republic">Central African Republic</option>
            <option value="Chad">Chad</option>
            <option value="Chile">Chile</option>
            <option value="China">China</option>
            <option value="Colombia">Colombia</option>
            <option value="Comoros">Comoros</option>
            <option value="Congo, Democratic Republic of the">Congo, Democratic Republic of the</option>
            <option value="Congo, Republic of the">Congo, Republic of the</option>
            <option value="Costa Rica">Costa Rica</option>
            <option value="Cote d'Ivoire">Cote d'Ivoire</option>
            <option value="Croatia">Croatia</option>
            <option value="Cuba">Cuba</option>
            <option value="Curacao">Curacao</option>
            <option value="Cyprus">Cyprus</option>
            <option value="Czech Republic">Czech Republic</option>
            <option value="Denmark">Denmark</option>
            <option value="Djibouti">Djibouti</option>
            <option value="Dominica">Dominica</option>
            <option value="Dominican Republic">Dominican Republic</option>
            <option value="East Timor (see&nbsp;Timor-Leste)">East Timor (see&nbsp;Timor-Leste)</option>
            <option value="Ecuador">Ecuador</option>
            <option value="Egypt">Egypt</option>
            <option value="El Salvador">El Salvador</option>
            <option value="Equatorial Guinea">Equatorial Guinea</option>
            <option value="Eritrea">Eritrea</option>
            <option value="Estonia">Estonia</option>
            <option value="Ethiopia">Ethiopia</option>
            <option value="Fiji">Fiji</option>
            <option value="Finland">Finland</option>
            <option value="France">France</option>
            <option value="Gabon">Gabon</option>
            <option value="Gambia, The">Gambia, The</option>
            <option value="Georgia">Georgia</option>
            <option value="Germany">Germany</option>
            <option value="Ghana">Ghana</option>
            <option value="Greece">Greece</option>
            <option value="Grenada">Grenada</option>
            <option value="Guatemala">Guatemala</option>
            <option value="Guinea">Guinea</option>
            <option value="Guinea-Bissau">Guinea-Bissau</option>
            <option value="Guyana">Guyana</option>
            <option value="Haiti">Haiti</option>
            <option value="Holy See">Holy See</option>
            <option value="Honduras">Honduras</option>
            <option value="Hong Kong">Hong Kong</option>
            <option value="Hungary">Hungary</option>
            <option value="Iceland">Iceland</option>
            <option value="India">India</option>
            <option value="Indonesia">Indonesia</option>
            <option value="Iran">Iran</option>
            <option value="Iraq">Iraq</option>
            <option value="Ireland">Ireland</option>
            <option value="Israel">Israel</option>
            <option value="Italy">Italy</option>
            <option value="Jamaica">Jamaica</option>
            <option value="Japan">Japan</option>
            <option value="Jordan">Jordan</option>
            <option value="Kazakhstan">Kazakhstan</option>
            <option value="Kenya">Kenya</option>
            <option value="Kiribati">Kiribati</option>
            <option value="Korea, North">Korea, North</option>
            <option value="Korea, South">Korea, South</option>
            <option value="Kosovo">Kosovo</option>
            <option value="Kuwait">Kuwait</option>
            <option value="Kyrgyzstan">Kyrgyzstan</option>
            <option value="Laos">Laos</option>
            <option value="Latvia">Latvia</option>
            <option value="Lebanon">Lebanon</option>
            <option value="Lesotho">Lesotho</option>
            <option value="Liberia">Liberia</option>
            <option value="Libya">Libya</option>
            <option value="Liechtenstein">Liechtenstein</option>
            <option value="Lithuania">Lithuania</option>
            <option value="Luxembourg">Luxembourg</option>
            <option value="Macau">Macau</option>
            <option value="Macedonia">Macedonia</option>
            <option value="Madagascar">Madagascar</option>
            <option value="Malawi">Malawi</option>
            <option value="Malaysia">Malaysia</option>
            <option value="Maldives">Maldives</option>
            <option value="Mali">Mali</option>
            <option value="Malta">Malta</option>
            <option value="Marshall Islands">Marshall Islands</option>
            <option value="Mauritania">Mauritania</option>
            <option value="Mauritius">Mauritius</option>
            <option value="Mexico">Mexico</option>
            <option value="Micronesia">Micronesia</option>
            <option value="Moldova">Moldova</option>
            <option value="Monaco">Monaco</option>
            <option value="Mongolia">Mongolia</option>
            <option value="Montenegro">Montenegro</option>
            <option value="Morocco">Morocco</option>
            <option value="Mozambique">Mozambique</option>
            <option value="Namibia">Namibia</option>
            <option value="Nauru">Nauru</option>
            <option value="Nepal">Nepal</option>
            <option value="Netherlands">Netherlands</option>
            <option value="Netherlands Antilles">Netherlands Antilles</option>
            <option value="New Zealand">New Zealand</option>
            <option value="Nicaragua">Nicaragua</option>
            <option value="Niger">Niger</option>
            <option value="Nigeria">Nigeria</option>
            <option value="North Korea">North Korea</option>
            <option value="Norway">Norway</option>
            <option value="Oman">Oman</option>
            <option value="Pakistan">Pakistan</option>
            <option value="Palau">Palau</option>
            <option value="Palestinian Territories">Palestinian Territories</option>
            <option value="Panama">Panama</option>
            <option value="Papua New Guinea">Papua New Guinea</option>
            <option value="Paraguay">Paraguay</option>
            <option value="Peru">Peru</option>
            <option value="Philippines">Philippines</option>
            <option value="Poland">Poland</option>
            <option value="Portugal">Portugal</option>
            <option value="Qatar">Qatar</option>
            <option value="Romania">Romania</option>
            <option value="Russia">Russia</option>
            <option value="Rwanda">Rwanda</option>
            <option value="Saint Kitts and Nevis">Saint Kitts and Nevis</option>
            <option value="Saint Lucia">Saint Lucia</option>
            <option value="Saint Vincent and the Grenadines">Saint Vincent and the Grenadines</option>
            <option value="Samoa">Samoa&nbsp;</option>
            <option value="San Marino">San Marino</option>
            <option value="Sao Tome and Principe">Sao Tome and Principe</option>
            <option value="Saudi Arabia">Saudi Arabia</option>
            <option value="Senegal">Senegal</option>
            <option value="Serbia">Serbia</option>
            <option value="Seychelles">Seychelles</option>
            <option value="Sierra Leone">Sierra Leone</option>
            <option value="Singapore">Singapore</option>
            <option value="Sint Maarten">Sint Maarten</option>
            <option value="Slovakia">Slovakia</option>
            <option value="Slovenia">Slovenia</option>
            <option value="Solomon Islands">Solomon Islands</option>
            <option value="Somalia">Somalia</option>
            <option value="South Africa">South Africa</option>
            <option value="South Korea">South Korea</option>
            <option value="South Sudan">South Sudan</option>
            <option value="Spain">Spain&nbsp;</option>
            <option value="Sri Lanka">Sri Lanka</option>
            <option value="Sudan">Sudan</option>
            <option value="Suriname">Suriname</option>
            <option value="Swaziland">Swaziland&nbsp;</option>
            <option value="Sweden">Sweden</option>
            <option value="Switzerland">Switzerland</option>
            <option value="Syria">Syria</option>
            <option value="Taiwan">Taiwan</option>
            <option value="Tajikistan">Tajikistan</option>
            <option value="Tanzania">Tanzania</option>
            <option value="Thailand">Thailand&nbsp;</option>
            <option value="Timor-Leste">Timor-Leste</option>
            <option value="Togo">Togo</option>
            <option value="Tonga">Tonga</option>
            <option value="Trinidad and Tobago">Trinidad and Tobago</option>
            <option value="Tunisia">Tunisia</option>
            <option value="Turkey">Turkey</option>
            <option value="Turkmenistan">Turkmenistan</option>
            <option value="Tuvalu">Tuvalu</option>
            <option value="Uganda">Uganda</option>
            <option value="Ukraine">Ukraine</option>
            <option value="United Arab Emirates">United Arab Emirates</option>
            <option value="United Kingdom">United Kingdom</option>
            <option value="Uruguay">Uruguay</option>
            <option value="Uzbekistan">Uzbekistan</option>
            <option value="Vanuatu">Vanuatu</option>
            <option value="Venezuela">Venezuela</option>
            <option value="Vietnam">Vietnam</option>
            <option value="Yemen">Yemen</option>
            <option value="Zambia">Zambia</option>
            <option value="Zimbabwe">Zimbabwe</option>
          </select></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoPlaceholder mktoPlaceholderEmployees_Picklist__c"></div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap mktoRequiredField">
        <div class="mk-form__select"><label for="reusableFormEntry5" id="LblreusableFormEntry5" class="mktoLabel mktoHasWidth" style="width: 150px;">
            <div class="mktoAsterix">*</div>Choose Timezone
          </label><select id="reusableFormEntry5" name="reusableFormEntry5" aria-labelledby="LblreusableFormEntry5 InstructreusableFormEntry5" class="mktoField mktoHasWidth mktoRequired mk-form--initialized" aria-required="true"
            style="width: 150px;">
            <option value="">Choose Timezone... *</option>
            <option value="Pacific Daylight Time (PDT)">Pacific Daylight Time (PDT)</option>
            <option value="Central Daylight Time (CDT)">Central Daylight Time (CDT)</option>
            <option value="Eastern Daylight Time (EDT)">Eastern Daylight Time (EDT)</option>
            <option value="British Summer Time (BST)">British Summer Time (BST)</option>
            <option value="Central European Summer Time (CEST)">Central European Summer Time (CEST)</option>
            <option value="Australian Eastern Standard Time (AEST)">Australian Eastern Standard Time (AEST)</option>
            <option value="Singapore Time (SGT)">Singapore Time (SGT)</option>
          </select></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap mktoRequiredField">
        <div class="mk-form__select"><label for="eventAttendeeType" id="LbleventAttendeeType" class="mktoLabel mktoHasWidth" style="width: 150px;">
            <div class="mktoAsterix">*</div>Attendee Type:
          </label><select id="eventAttendeeType" name="eventAttendeeType" aria-labelledby="LbleventAttendeeType InstructeventAttendeeType" class="mktoField mktoHasWidth mktoRequired mk-form--initialized" aria-required="true" style="width: 150px;">
            <option value="">Attendee Type *</option>
            <option value="Customer">Customer</option>
            <option value="Prospective Customer">Prospective Customer</option>
            <option value="Partner">Partner</option>
            <option value="Analyst">Analyst</option>
            <option value="Student">Student</option>
            <option value="Proofpoint Employee">Proofpoint Employee</option>
          </select></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap mktoRequiredField">
        <div class="mk-form__select"><label for="eventTopicInterest" id="LbleventTopicInterest" class="mktoLabel mktoHasWidth" style="width: 150px;">
            <div class="mktoAsterix">*</div>What Track Most Interests You?
          </label><select id="eventTopicInterest" name="eventTopicInterest" aria-labelledby="LbleventTopicInterest InstructeventTopicInterest" class="mktoField mktoHasWidth mktoRequired mk-form--initialized" aria-required="true"
            style="width: 150px;">
            <option value="">What Track Most Interests You? *</option>
            <option value="Information Protection">Information Protection/Cloud Security</option>
            <option value="Threat Protection">Threat Protection</option>
            <option value="Compliance">Compliance</option>
            <option value="CISO/Thought Leadership">CISO/Thought Leadership</option>
          </select></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoPlaceholder mktoPlaceholderprogramRouter"></div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Pay_Per_Click_Keyword__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Most_Recent_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="website" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Most_Recent_Asset_Type__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="Meeting" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Most_Recent_Medium_Detail__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="www-pfpt" placeholder="" style="margin-bottom: 5px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoNative" style="margin-left: 110px;"><button type="submit" class="mktoButton">Register</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="13526" placeholder=""><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="309-RHV-619" placeholder=""><input type="hidden" name="Website_Conversion_URL__c" class="mktoField mktoFieldDescriptor"
    value="https://www.proofpoint.com/au/events/protect"><input type="hidden" name="gAClientID" class="mktoField mktoFieldDescriptor" value="1905736413.1648447891">
  <div class="mktoFormRow">
    <div class="mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset mktoHasWidth" style="width: 5px;"></div>
      <div class="mktoFieldWrap">
        <div class="mktoHtmlText mktoHasWidth" style="width: 255px;">
          <script>
            // <![CDATA[
            MktoForms2.whenReady(function(form) {
              var formEl = form.getFormElem()[0],
                moveEl = formEl.querySelector('#addl_info');
              [].forEach.call(formEl.querySelectorAll('.mktoForm > .mktoFormRow'), function(row) {
                !row.contains(moveEl) || formEl.appendChild(row);
              });
            });
            // ]]>
          </script>
          <div id="addl_info"><span style="font-size: 11px;"><span style="font-size: 11px;"><br></span></span>
            <p>For more information, please see our <a href="https://www.proofpoint.com/us/privacy-policy" target="_blank" id="">Privacy Policy.</a> By registering, you agree to the following
              <a href="https://proofpoint.com/us/events/protect/terms-of-participation" target="_blank">Terms of Participation.</a>&nbsp;If you prefer not to receive marketing emails from Proofpoint, you can opt-out of all marketing communications or
              customise your preferences <a href="https://go.proofpoint.com/subscribe.html" target="_blank" id="">here</a>.<br></p>
          </div>
        </div>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <fieldset id="db_data_container" style="border: none;"><input id="db_registry_company_name" name="db_registry_company_name" type="hidden" value=""><input id="db_registry_city" name="db_registry_city" type="hidden" value="Stockholm"><input
      id="db_registry_state" name="db_registry_state" type="hidden" value="AB"><input id="db_registry_zip_code" name="db_registry_zip_code" type="hidden" value="109 42"><input id="db_registry_area_code" name="db_registry_area_code" type="hidden"
      value=""><input id="db_registry_dma_code" name="db_registry_dma_code" type="hidden" value=""><input id="db_registry_country" name="db_registry_country" type="hidden" value="Sweden"><input id="db_registry_country_code"
      name="db_registry_country_code" type="hidden" value="SE"><input id="db_registry_country_code3" name="db_registry_country_code3" type="hidden" value=""><input id="db_registry_latitude" name="db_registry_latitude" type="hidden"
      value="59.33"><input id="db_registry_longitude" name="db_registry_longitude" type="hidden" value="18.07"><input id="demandbasesid" name="demandbasesid" type="hidden" value="125495989"><input id="db_marketing_alias" name="db_marketing_alias"
      type="hidden" value="Lake Solutions"><input id="Industry" name="Industry" type="hidden" value="Software &amp; Technology"><input id="db_sub_industry" name="db_sub_industry" type="hidden" value="Data &amp; Technical Services"><input
      id="db_employee_count" name="db_employee_count" type="hidden" value="4"><input id="db_isp" name="db_isp" type="hidden" value="false"><input id="db_primary_sic" name="db_primary_sic" type="hidden" value="7379"><input id="db_primary_naics"
      name="db_primary_naics" type="hidden" value="541510"><input id="Address" name="Address" type="hidden" value="Neugutstrasse 16"><input id="City" name="City" type="hidden" value="Wallisellen"><input id="State" name="State" type="hidden"
      value="ZH"><input id="Postalcode" name="Postalcode" type="hidden" value=""><input id="db_country_name" name="db_country_name" type="hidden" value="Switzerland"><input id="db_phone" name="db_phone" type="hidden" value="+41 44 877 38 77"><input
      id="db_stock_ticker" name="db_stock_ticker" type="hidden" value=""><input id="Website" name="Website" type="hidden" value="lake.ch"><input id="db_annual_sales" name="db_annual_sales" type="hidden" value="860000"><input id="AnnualRevenue"
      name="AnnualRevenue" type="hidden" value="$1 - $1M"><input id="Employees_Picklist__c" name="Employees_Picklist__c" type="hidden" value="Less than 250"><input id="db_b2b" name="db_b2b" type="hidden" value="true"><input id="db_b2c" name="db_b2c"
      type="hidden" value="false"><input id="db_traffic" name="db_traffic" type="hidden" value="Low"><input id="db_latitude" name="db_latitude" type="hidden" value="47.41"><input id="db_longitude" name="db_longitude" type="hidden" value="8.6"><input
      id="db_fortune_1000" name="db_fortune_1000" type="hidden" value="false"><input id="db_forbes_2000" name="db_forbes_2000" type="hidden" value="false"><input id="db_information_level" name="db_information_level" type="hidden"
      value="Detailed"><input id="db_audience" name="db_audience" type="hidden" value="SMB"><input id="db_audience_segment" name="db_audience_segment" type="hidden" value="Software &amp; Technology"><input id="db_ip" name="db_ip" type="hidden"
      value="217.64.151.5"><input id="db_region_name" name="db_region_name" type="hidden" value="Stockholm"><input id="demandBase_Data_Source" name="demandBase_Data_Source" type="hidden" value="ip"></fieldset>
</form>

<form data-mkto-id="13526" data-mkto-base="//app-abj.marketo.com" data-munchkin-id="309-RHV-619" data-submit-text="" data-redirect-link="https://www.proofpoint.com/uk/events/protect/thank-you" data-prefill="" data-event-label=""
  class="mk-form__form marketo-form-block__form mktoForm mktoHasWidth mktoLayoutLeft" novalidate="novalidate"
  style="font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>

Text Content

Skip to main content
Products Solutions Partners Resources Company ContactLanguages
Support Log-in Digital Risk Portal Email Fraud Defense ET Intelligence
Proofpoint Essentials Sendmail Support Log-in
Main Menu

EMAIL SECURITY AND PROTECTION

Defend against threats, ensure business continuity, and implement email
policies.

ADVANCED THREAT PROTECTION

Protect against email, mobile, social and desktop threats.

SECURITY AWARENESS TRAINING

Engage your users and turn them into a strong line of defense against phishing
and other cyber attacks.

CLOUD SECURITY

Defend against cyber criminals accessing your sensitive data and trusted
accounts.

ARCHIVING AND COMPLIANCE

Reduce risk, control costs and improve data visibility to ensure compliance.

INFORMATION PROTECTION

Safeguard data in email, cloud apps, on-premise file shares and SharePoint.

DIGITAL RISK PROTECTION

Protect against digital security risks across web domains, social media and the
deep and dark web.

PREMIUM SECURITY SERVICES

Get deeper insight with on-call, personalised assistance from our expert team.


RANSOMWARE SURVIVAL GUIDE

Learn what to do before, during and after a ransomware attack with the 2022
Ransomware Survival Guide.

Learn More


SOLUTIONS BY TOPIC

COMBAT EMAIL AND CLOUD THREATS

Protect your people from email and cloud threats with an intelligent and
holistic approach.

CHANGE USER BEHAVIOUR

Help your employees identify, resist and report attacks before the damage is
done.

COMBAT DATA LOSS AND INSIDER RISK

Prevent data loss via negligent, compromised and malicious insiders by
correlating content, behaviour and threats.

MODERNISE COMPLIANCE AND ARCHIVING

Manage risk and data retention needs with a modern compliance and archiving
solution.

PROTECT CLOUD APPS

Keep your people and their cloud apps secure by eliminating threats, avoiding
data loss and mitigating compliance risk.

SECURE MICROSOFT 365

Implement the very best security and compliance solution for your Microsoft 365
collaboration suite.

DEFEND YOUR REMOTE WORKFORCE

Secure access to corporate resources and ensure business continuity for your
remote workers.

WHY PROOFPOINT

Today’s cyber attacks target people. Learn about our unique people-centric
approach to protection.


SOLUTIONS BY INDUSTRY

Federal Government Financial Services Healthcare Mobile for ISPs Email for ISPs
Small and Medium Businesses


PARTNER PROGRAMS

CHANNEL PARTNERS

Become a channel partner. Deliver Proofpoint solutions to your customers and
grow your business.

ARCHIVE EXTRACTION PARTNERS

Learn about the benefits of becoming a Proofpoint Extraction Partner.

TECHNOLOGY AND ALLIANCE PARTNERS

Learn about our relationships with industry-leading firms to help protect your
people, data and brand.

SOCIAL MEDIA PROTECTION PARTNERS

Learn about the technology and alliance partners in our Social Media Protection
Partner program.


PARTNER TOOLS

Become a Channel Partner Channel Partner Portal

RESOURCE LIBRARY

Find the information you're looking for in our library of videos, data sheets,
white papers and more.

BLOG

Keep up with the latest news and happenings in the ever-evolving cybersecurity
landscape.

PODCASTS

Learn about the human side of cybersecurity. Episodes feature insights from
experts and executives.

THREAT GLOSSARY

Learn about the latest security threats and how to protect your people, data,
and brand.

EVENTS

Connect with us at events to learn how to protect your people and data from
ever-evolving threats.

CUSTOMER STORIES

Read how Proofpoint customers around the globe solve their most pressing
cybersecurity challenges.

WEBINARS

Browse our webinar library to learn about the latest threats, trends and issues
in cybersecurity.


SECURITY HUBS

Get free research and resources to help you protect against threats, build a
security culture, and stop ransomware in its tracks.

Cybersecurity Awareness Hub
Ransomware Hub
Compliance Hub

ABOUT PROOFPOINT

Proofpoint is a leading cybersecurity company that protects organizations'
greatest assets and biggest risks: their people.

WHY PROOFPOINT

Today’s cyber attacks target people. Learn about our unique people-centric
approach to protection.

NEWS CENTER

Read the latest press releases, news stories and media highlights about
Proofpoint.


SUPPORT

Access the full range of Proofpoint support services.

Learn More
United States United Kingdom France Germany Italy Spain Japan Australia
Products
Overview Email Protection Email Fraud Defense Threat Response Auto-Pull Sendmail
Open Source Essentials for Small Business
Overview Targeted Attack Protection in Email Email Isolation Threat Response
Emerging Threats Intelligence
Overview Simulated Phishing and Knowledge Assessments Training Modules, Videos
and Materials Phishing Email Reporting and Analysis Business Intelligence
Overview Browser Isolation Cloud Account Defense Cloud App Security Broker Web
Security
Overview Capture & Monitor
Content Capture Content Patrol Compliance Gateway
Archiving
Enterprise Archive Intelligent Supervision E-discovery Analytics NexusAI
Compliance
Overview Endpoint Data Loss Prevention (DLP) Enterprise Data Loss Prevention
(DLP) Email Data Loss Prevention (DLP) Email Encryption Data Discover Insider
Threat Management
Overview Social Media Protection Digital Compliance Domain Fraud Monitoring
Executive and Location Threat Monitoring
Overview Technical Account Managers Premium Threat Information Service Managed
Services for Security Awareness Training People-Centric Security Program Managed
Services for Information Protection
Products Solutions Partners Resources Company
United States United Kingdom France Germany Italy Spain Japan Australia
Login
Support Log-in Digital Risk Portal Email Fraud Defense ET Intelligence
Proofpoint Essentials Sendmail Support Log-in
Contact


EMAIL SECURITY AND PROTECTION

Defend against threats, ensure business continuity, and implement email
policies.

ADVANCED THREAT PROTECTION

Protect against email, mobile, social and desktop threats.

SECURITY AWARENESS TRAINING

Engage your users and turn them into a strong line of defense against phishing
and other cyber attacks.

CLOUD SECURITY

Defend against cyber criminals accessing your sensitive data and trusted
accounts.

ARCHIVING AND COMPLIANCE

Reduce risk, control costs and improve data visibility to ensure compliance.

INFORMATION PROTECTION

Safeguard data in email, cloud apps, on-premise file shares and SharePoint.

DIGITAL RISK PROTECTION

Protect against digital security risks across web domains, social media and the
deep and dark web.

PREMIUM SECURITY SERVICES

Get deeper insight with on-call, personalised assistance from our expert team.

Overview Email Protection Email Fraud Defense Threat Response Auto-Pull Sendmail
Open Source Essentials for Small Business
Overview Targeted Attack Protection in Email Email Isolation Threat Response
Emerging Threats Intelligence
Overview Simulated Phishing and Knowledge Assessments Training Modules, Videos
and Materials Phishing Email Reporting and Analysis Business Intelligence
Overview Browser Isolation Cloud Account Defense Cloud App Security Broker Web
Security
Overview Capture & Monitor
Content Capture Content Patrol Compliance Gateway
Archiving
Enterprise Archive Intelligent Supervision E-discovery Analytics NexusAI
Compliance
Overview Endpoint Data Loss Prevention (DLP) Enterprise Data Loss Prevention
(DLP) Email Data Loss Prevention (DLP) Email Encryption Data Discover Insider
Threat Management
Overview Social Media Protection Digital Compliance Domain Fraud Monitoring
Executive and Location Threat Monitoring
Overview Technical Account Managers Premium Threat Information Service Managed
Services for Security Awareness Training People-Centric Security Program Managed
Services for Information Protection


RANSOMWARE SURVIVAL GUIDE

Learn what to do before, during and after a ransomware attack with the 2022
Ransomware Survival Guide.

Learn More


SOLUTIONS BY TOPIC

COMBAT EMAIL AND CLOUD THREATS

Protect your people from email and cloud threats with an intelligent and
holistic approach.

CHANGE USER BEHAVIOUR

Help your employees identify, resist and report attacks before the damage is
done.

COMBAT DATA LOSS AND INSIDER RISK

Prevent data loss via negligent, compromised and malicious insiders by
correlating content, behaviour and threats.

MODERNISE COMPLIANCE AND ARCHIVING

Manage risk and data retention needs with a modern compliance and archiving
solution.

PROTECT CLOUD APPS

Keep your people and their cloud apps secure by eliminating threats, avoiding
data loss and mitigating compliance risk.

SECURE MICROSOFT 365

Implement the very best security and compliance solution for your Microsoft 365
collaboration suite.

DEFEND YOUR REMOTE WORKFORCE

Secure access to corporate resources and ensure business continuity for your
remote workers.

WHY PROOFPOINT

Today’s cyber attacks target people. Learn about our unique people-centric
approach to protection.


SOLUTIONS BY INDUSTRY

Federal Government Financial Services Healthcare Mobile for ISPs Email for ISPs
Small and Medium Businesses


PARTNER PROGRAMS

CHANNEL PARTNERS

Become a channel partner. Deliver Proofpoint solutions to your customers and
grow your business.

ARCHIVE EXTRACTION PARTNERS

Learn about the benefits of becoming a Proofpoint Extraction Partner.

TECHNOLOGY AND ALLIANCE PARTNERS

Learn about our relationships with industry-leading firms to help protect your
people, data and brand.

SOCIAL MEDIA PROTECTION PARTNERS

Learn about the technology and alliance partners in our Social Media Protection
Partner program.


PARTNER TOOLS

Become a Channel Partner Channel Partner Portal

RESOURCE LIBRARY

Find the information you're looking for in our library of videos, data sheets,
white papers and more.

BLOG

Keep up with the latest news and happenings in the ever-evolving cybersecurity
landscape.

PODCASTS

Learn about the human side of cybersecurity. Episodes feature insights from
experts and executives.

THREAT GLOSSARY

Learn about the latest security threats and how to protect your people, data,
and brand.

EVENTS

Connect with us at events to learn how to protect your people and data from
ever-evolving threats.

CUSTOMER STORIES

Read how Proofpoint customers around the globe solve their most pressing
cybersecurity challenges.

WEBINARS

Browse our webinar library to learn about the latest threats, trends and issues
in cybersecurity.


SECURITY HUBS

Get free research and resources to help you protect against threats, build a
security culture, and stop ransomware in its tracks.

Cybersecurity Awareness Hub
Ransomware Hub
Compliance Hub

ABOUT PROOFPOINT

Proofpoint is a leading cybersecurity company that protects organizations'
greatest assets and biggest risks: their people.

WHY PROOFPOINT

Today’s cyber attacks target people. Learn about our unique people-centric
approach to protection.

NEWS CENTER

Read the latest press releases, news stories and media highlights about
Proofpoint.


SUPPORT

Access the full range of Proofpoint support services.

Learn More
Zeigen Sie weiterhin Inhalte für Ihren Standort an
United StatesUnited KingdomFranceDeutschlandEspaña日本AustraliaItaliaFortsetzen
Events
Protect

WISDOM

May 19, 2022
Security Awareness

Learn More

AGENDA

View full Protect agenda.

Learn More

FREQUENTLY ASKED QUESTIONS

Get all the answers here.

Learn More



PROTECT 2022

Welcome to Proofpoint Protect 2022. In a new world of advanced security threats
and compliance risks, one thing remains the same. Attackers target people. And
their techniques have evolved to become broader and more integrated over time.
This makes it increasingly important to protect your people and your data.

Join us at Protect 2022 to learn how you can tap into the power of Proofpoint to
counter modern attacks and protect against compliance violations.


WHY ATTEND PROOFPOINT PROTECT 2022?

 * Hear compelling keynotes from Proofpoint executives and industry experts
 * Discover how top cybersecurity and compliance professionals are protecting
   their organizations and people with Proofpoint products
 * Learn about new Proofpoint products that will accelerate your journey to
   people-centric security and compliance
 * Learn how to access and apply data insights to fortify your cybersecurity and
   compliance posture
 * Discuss with fellow top CISOs trends and best practices, such as engaging
   with the board of directors and cyber insurance

View Full Agenda

*
First Name




*
Last Name




*
Business Email




*
Company Name




*
Job Title




*
Country:Country *United StatesAfghanistanAlbaniaAlgeriaAndorraAngolaAntigua and
BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamas,
TheBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBhutanBoliviaBosnia and
HerzegovinaBotswanaBrazilBrunei BulgariaBurkina
FasoBurmaBurundiCambodiaCameroonCanadaCape VerdeCentral African
RepublicChadChileChinaColombiaComorosCongo, Democratic Republic of theCongo,
Republic of theCosta RicaCote d'IvoireCroatiaCubaCuracaoCyprusCzech
RepublicDenmarkDjiboutiDominicaDominican RepublicEast Timor
(see Timor-Leste)EcuadorEgyptEl SalvadorEquatorial
GuineaEritreaEstoniaEthiopiaFijiFinlandFranceGabonGambia,
TheGeorgiaGermanyGhanaGreeceGrenadaGuatemalaGuineaGuinea-BissauGuyanaHaitiHoly
SeeHondurasHong
KongHungaryIcelandIndiaIndonesiaIranIraqIrelandIsraelItalyJamaicaJapanJordanKazakhstanKenyaKiribatiKorea,
NorthKorea,
SouthKosovoKuwaitKyrgyzstanLaosLatviaLebanonLesothoLiberiaLibyaLiechtensteinLithuaniaLuxembourgMacauMacedoniaMadagascarMalawiMalaysiaMaldivesMaliMaltaMarshall
IslandsMauritaniaMauritiusMexicoMicronesiaMoldovaMonacoMongoliaMontenegroMoroccoMozambiqueNamibiaNauruNepalNetherlandsNetherlands
AntillesNew ZealandNicaraguaNigerNigeriaNorth
KoreaNorwayOmanPakistanPalauPalestinian TerritoriesPanamaPapua New
GuineaParaguayPeruPhilippinesPolandPortugalQatarRomaniaRussiaRwandaSaint Kitts
and NevisSaint LuciaSaint Vincent and the GrenadinesSamoa San MarinoSao Tome and
PrincipeSaudi ArabiaSenegalSerbiaSeychellesSierra LeoneSingaporeSint
MaartenSlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSouth KoreaSouth
SudanSpain Sri
LankaSudanSurinameSwaziland SwedenSwitzerlandSyriaTaiwanTajikistanTanzaniaThailand Timor-LesteTogoTongaTrinidad
and TobagoTunisiaTurkeyTurkmenistanTuvaluUgandaUkraineUnited Arab EmiratesUnited
KingdomUruguayUzbekistanVanuatuVenezuelaVietnamYemenZambiaZimbabwe



*
Choose TimezoneChoose Timezone... *Pacific Daylight Time (PDT)Central Daylight
Time (CDT)Eastern Daylight Time (EDT)British Summer Time (BST)Central European
Summer Time (CEST)Australian Eastern Standard Time (AEST)Singapore Time (SGT)


*
Attendee Type:Attendee Type *CustomerProspective
CustomerPartnerAnalystStudentProofpoint Employee


*
What Track Most Interests You?What Track Most Interests You? *Information
Protection/Cloud SecurityThreat ProtectionComplianceCISO/Thought Leadership







Register



For more information, please see our Privacy Policy. By registering, you agree
to the following Terms of Participation. If you prefer not to receive marketing
emails from Proofpoint, you can opt-out of all marketing communications or
customise your preferences here.






Thank you for your submission.




FEATURED SPEAKERS


ASHAN WILLY

Chief Executive Officer, Proofpoint


RYAN KALEMBER

EVP, Cybersecurity Strategy, Proofpoint


TRACKS


INNOVATIONS AND PLATFORMS TO PROTECT YOU. PLAN YOUR EXPERIENCE AT PROTECT 2022.

Information and Cloud Security
Threat Protection
Compliance
CISO / Thought Leadership

INFORMATION AND CLOUD SECURITY

Remote work and adoption of cloud applications are driving concerns around data
loss and cloud security. Join us for a mix of roadmap, customer panels, and
demonstrations of new innovations for our solutions to protect your information
in a work-from-anywhere world.

 * Get a roadmap of Proofpoint People-centric Enterprise Data Loss Prevention
   and Security Services Edge
 * Hear from panels featuring customers and experts discussing strategies and
   best practices
 * See how to tackle key use cases with fast time to value

THREAT PROTECTION

The Threat Protection track brings together Proofpoint customers and product
leaders to explore the evolving threat landscape and best practices to defend
against threats such as ransomware, business email compromise, cloud account
compromise, and malware. Featuring a mix of customer sessions and product
overviews, you get real-world insights and advice on protecting the No.1 threat
vector.

 * Preview Proofpoint Threat Protection product strategy and roadmap
 * Hear from customers about their email and cloud security strategies
 * Explore how integrating controls can supercharge your security
 * Join practitioner sessions covering practical implementation of email
   security controls

COMPLIANCE

We now live in a world where most interactions will remain virtual, and
employees continue to work remotely. Are you prepared for the volume and
diversity in the types of digital communications that require your
attention—from both a regulatory and legal perspective? The Proofpoint
Compliance Platform is here to help.

 * Learn how our Intelligent Compliance roadmap is helping you stay aligned with
   what is needed to stay compliant and with legal protection
 * Hear from industry experts and Proofpoint customers on trends in the
   compliance landscape
 * Join hands-on sessions that show the power of the Proofpoint Compliance
   Platform

CISO / THOUGHT LEADERSHIP

Join other information security leaders in thought-provoking topics that CISOs
face in today’s complex world. You’ll gain a wealth of best practices and
leadership advice on better ways to mitigate risk and protect your most valuable
asset—your people.

 * Learn about best practices for interacting with the company board of
   directors
 * Hear from fellow CISOs on trends in the regulatory landscape and cyber
   insurance
 * See how to use a people-centric framework to understand risk and reduce it
   within your organization
 * Learn about our findings from our annual Voice of the CISO report




AGENDA

--------------------------------------------------------------------------------

Singapore Time (SGT)Pacific Daylight Time (PDT)Central Daylight Time
(CDT)Eastern Daylight Time (EDT)British Summer Time (BST)Central European Summer
Time (CEST) Choose your time zone:
The conference is offered multiple times to accommodate different time zones.
Australian Eastern Standard Time (AEST)
Singapore Time (SGT)
Pacific Daylight Time (PDT)
Central Daylight Time (CDT)
Eastern Daylight Time (EDT)
British Summer Time (BST)
Central European Summer Time (CEST)
May 18 | Wed May 19 | Thu

DAY 1

10:00AM - 10:10AM

Protect Opening Message

10:10AM - 10:25AM

 

Proofpoint Welcome Keynote with Ashan Willy, CEO

--------------------------------------------------------------------------------

Ashan will provide a company update and share exciting announcements on our
people-centric innovations to help you mitigate security and compliance risks.

10:25AM - 10:50AM

 

Customer Panel - Protecting Against the Threat and Risk Actor's Platform

--------------------------------------------------------------------------------

Phishing, ransomware, BEC, account compromised suppliers… the list of tools
accessible to threat actors continues to both expand and integrate into the
modern attacker's platform. Join us in this panel of CISOs to discuss how they
counter the threat actor’s attack platform targeting their most valuable asset -
their people.

10:50AM - 11:00AM

Break and Updates

11:00AM - 11:25AM

 

Customer Panel - Reducing Risk in Information Loss and Cloud Threats

--------------------------------------------------------------------------------

With all that's changed in technology, data still doesn't lose itself -
malicious, compromised, or careless users lose it. A new people-centric approach
is needed to counter data loss - especially with employees working remote and
adopting cloud applications. Join this panel of CISOs as they discuss how they
counter data loss and reduce insider risk.

11:25AM - 11:55AM

 

The Proofpoint Platforms vs. The Attacker's Platform

--------------------------------------------------------------------------------

With risk continuing to converge around people, Proofpoint is helping you keep
pace with the visibility, effectiveness, and operational efficiency you need to
mitigate those risks. Join this session to hear about Proofpoint’s latest
innovations across our threat protection, information protection, and compliance
platforms.

11:55AM - 12:00PM

Break and Updates

12:00PM - 12:20PM

 

Guest Speaker

--------------------------------------------------------------------------------

Our Protect guest speaker will be announced shortly

12:20PM - 12:30PM

Closing Session

DAY 2

3:00AM - 6:00AM AEST

Content Tracks

Information Protection and Cloud Security Threat Protection Compliance CISO /
Thought Leadership

3:00AM - 3:05AM AEST

Welcome to Protect - Day 2

3:05AM - 3:35AM AEST

Roadmap + Vision: Defending Against Email Threats Targeting Your People

3:35AM - 3:40AM AEST

Break

3:40AM - 4:10AM AEST

Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss

4:10AM - 4:15AM AEST

Break

4:15AM - 4:45AM AEST

 

Solving Real Security Problems - Proofpoint Security Services Edge

--------------------------------------------------------------------------------

Proofpoint has integrated technologies such as CASB, SWG, RBI to address the
needs of cloud security into what we call Proofpoint Security Services Edge. But
let's put aside the technology acronym and join this panel of cloud security
experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is
uniquely able to solve them. 

4:45AM - 4:50AM AEST

Break

4:50AM - 5:20AM AEST

 

Reducing Data Loss Risk with Everyone Working Remote and Adopting Cloud Apps

--------------------------------------------------------------------------------

Join us in this panel where users of the Proofpoint platform will share how they
adopted a people-centric approach to data loss and insider threat and were able
to reduce the risk associated with their data. 

5:20AM - 5:25AM AEST

Break

5:25AM - 5:55AM AEST

 

Practitioner's session: Using the Proofpoint Platform to Reduce Data Loss

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to put into production
Proofpoint's Data Loss Prevention platform. 

5:55AM - 6:00AM AEST

Closing Session

3:00AM - 3:05AM AEST

Welcome to Protect - Day 2

3:05AM - 3:35AM AEST

Roadmap + Vision: Defending Against Email Threats Targeting Your People

3:35AM - 3:40AM AEST

Break

3:40AM - 4:10AM AEST

Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss

4:10AM - 4:15AM AEST

Break

4:15AM - 4:45AM AEST

 

Countering the Attacker's Platform with the Proofpoint Platform

--------------------------------------------------------------------------------

Join us in this panel where Proofpoint users will share their journey adopting
and growing their Proofpoint Threat Protection platform - from protecting
against email threats, making their end users resilient, fighting against cloud
delivered threats.

4:45AM - 4:50AM AEST

Break

4:50AM - 5:20AM AEST

 

Expanding Defenses with Email Authentication

--------------------------------------------------------------------------------

Join this customer session to learn why and how they implemented email
authentication to address the concerns of email impersonation, BEC attacks,
supplier risk and application email hygiene aimed at employees, customers and
partners.

5:20AM - 5:25AM AEST

Break

5:25AM - 5:55AM AEST

 

Practitioner's session: Using the Proofpoint platform to defend against threats

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to counter the attacker's
platform and protect your users over email and the cloud. 

5:55AM - 6:00AM AEST

Closing Session

3:00AM - 3:05AM AEST

Welcome to Protect - Day 2

3:05AM - 3:35AM AEST

 

Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap

--------------------------------------------------------------------------------

When the next decade of workplace communications relies solely on digital
collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for
Financial Services and regulated organizations to understand how Proofpoint is
staying ahead with you for maximum Compliance and Legal protection

3:35AM - 3:40AM AEST

Break

3:40AM - 4:10AM AEST

 

Compliance & Legal Trends in 2022

--------------------------------------------------------------------------------

In the current ever-changing business landscape, join us to learn from industry
experts and Proofpoint specialists as they discuss views on Compliance and Legal
trends in 2022 and beyond.

4:10AM - 4:15AM AEST

Break

4:15AM - 4:45AM AEST

 

Regulatory Guidance on Compliance

--------------------------------------------------------------------------------

Join us for a session with a regulatory industry expert to discuss best
practices on how regulated organizations monitor and supervise business
communications while protecting critical corporate data from insider threats.

4:45AM - 4:50AM AEST

Break

4:50AM - 5:20AM AEST

 

Technologies Impacting Litigation Readiness

--------------------------------------------------------------------------------

Join us for a session with an experienced legal expert to discuss trends and
best practices on building a sound corporate legal protection strategy for
organizations with high exposure to litigations.

5:20AM - 5:25AM AEST

Break

5:25AM - 5:55AM AEST

 

Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to maximize the impact of your
Proofpoint Compliance Platform.

5:55AM - 6:00AM AEST

Closing Session

3:00AM - 3:05AM AEST

Welcome to Protect - Day 2

3:05AM - 3:35AM AEST

 

Voice of the CISO report

--------------------------------------------------------------------------------

Learn what key challenges are facing CISOs across the globe as we unveil the
findings of the 2022 Voice of the CISO report. The survey explores three key
areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels
of employee and organizational preparedness to face them, and the impact of
supporting a hybrid workforce as businesses prepare to re-open their corporate
offices. It also covers the challenges CISOs face in their roles, position
amongst the C-suite, and business expectations of their teams.

3:35AM - 3:40AM AEST

Break

3:40AM - 4:10AM AEST

 

What’s Next in People-Centric Security: Roadmap and Overview for Nexus People
Risk Explorer (NPRE)

--------------------------------------------------------------------------------

Understanding your people-centric risk allows one to better plan and reduce your
organization's risk posture. Join us in this session as we discuss with
customers how they leverage the Proofpoint Nexus People Risk Explorer to
understand risk and activate processes to reduce risk exposure.

4:10AM - 4:15AM AEST

Break

4:15AM - 4:45AM AEST

 

Strategies for Board Engagement

--------------------------------------------------------------------------------

Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to
elevate the profile of the CISO. The CISO now has a leadership voice and must
use it to instill confidence at the highest levels of the organization and as
the foremost executive on the front lines against the threat of systemic risk. A
single cyber event can have devastating consequences on an organization's
ability to deliver its operational value.  CISOs need to have identified the
potential ‘showstopper’ risks for their enterprise and ensure that the Board
understands the position. Learn from veteran Board members about their journey
to the Board room and expectations for understanding cyber risk. 
 

4:45AM - 4:50AM AEST

Break

4:50AM - 5:20AM AEST

 

Regulatory landscape in 2022

--------------------------------------------------------------------------------

Managing data privacy risk in a dynamic regulatory environment is challenging.
Compounding that is the fact that you have to defend your regulated data against
threats inside and outside the organization.  You need to put in “appropriate”
or “reasonable” security measures, but it is up to you to develop them. Join us
for a critical fireside chat with Global regulators. 

5:20AM - 5:25AM AEST

Break

5:25AM - 5:55AM AEST

 

CISO perspective on cyber insurance

--------------------------------------------------------------------------------

Cyber insurance is designed to transfer risks to the insurer. For insurers to be
profitable, they must have a fundamental grasp of the risks facing organizations
and shifts in the threat landscape. As work becomes increasingly flexible and
more solutions move to the cloud, protecting organizations is increasingly
challenging.

Despite the challenges, Cyber Insurance exists for organizations to help address
residual risk. Many organizations are faced with exponential premium increases
as they try to understand what cyber insurance actually covers, while others are
forced to renew due to contractual obligations or decide to self-insure. This
environment creates confusion as organizations ask: does cyber insurance
provides risk mitigation or just a measured level of resilience?

5:55AM - 6:00AM AEST

Closing Session

May 18 | Wed May 19 | Thu

DAY 1

SESSION

3:00AM - 3:10AM AEST

Protect Opening Message

3:10AM - 3:25AM AEST

 

Proofpoint Welcome Keynote with Ashan Willy, CEO

--------------------------------------------------------------------------------

Ashan will provide a company update and share exciting announcements on our
people-centric innovations to help you mitigate security and compliance risks.

3:25AM - 3:50AM AEST

 

Customer Panel - Protecting Against the Threat and Risk Actor's Platform

--------------------------------------------------------------------------------

Phishing, ransomware, BEC, account compromised suppliers… the list of tools
accessible to threat actors continues to both expand and integrate into the
modern attacker's platform. Join us in this panel of CISOs to discuss how they
counter the threat actor’s attack platform targeting their most valuable asset -
their people.

3:50AM - 4:00AM AEST

Break and Updates

4:00AM - 4:25AM AEST

 

Customer Panel - Reducing Risk in Information Loss and Cloud Threats

--------------------------------------------------------------------------------

With all that's changed in technology, data still doesn't lose itself -
malicious, compromised, or careless users lose it. A new people-centric approach
is needed to counter data loss - especially with employees working remote and
adopting cloud applications. Join this panel of CISOs as they discuss how they
counter data loss and reduce insider risk.

4:25AM - 4:55AM AEST

 

The Proofpoint Platforms vs. The Attacker's Platform

--------------------------------------------------------------------------------

With risk continuing to converge around people, Proofpoint is helping you keep
pace with the visibility, effectiveness, and operational efficiency you need to
mitigate those risks. Join this session to hear about Proofpoint’s latest
innovations across our threat protection, information protection, and compliance
platforms.

4:55AM - 5:00AM AEST

Break and Updates

5:00AM - 5:20AM AEST

 

Guest Speaker

--------------------------------------------------------------------------------

Our Protect guest speaker will be announced shortly

5:20AM - 5:30AM AEST

Closing Session

DAY 2

SESSION

3:00AM - 6:00AM AEST

Content Tracks

Information Protection and Cloud Security Threat Protection Compliance CISO /
Thought Leadership

3:00AM - 3:05AM AEST

Welcome to Protect - Day 2

3:05AM - 3:35AM AEST

Roadmap + Vision: Defending Against Email Threats Targeting Your People

3:35AM - 3:40AM AEST

Break

3:40AM - 4:10AM AEST

Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss

4:10AM - 4:15AM AEST

Break

4:15AM - 4:45AM AEST

 

Solving Real Security Problems - Proofpoint Security Services Edge

--------------------------------------------------------------------------------

Proofpoint has integrated technologies such as CASB, SWG, RBI to address the
needs of cloud security into what we call Proofpoint Security Services Edge. But
let's put aside the technology acronym and join this panel of cloud security
experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is
uniquely able to solve them. 

4:45AM - 4:50AM AEST

Break

4:50AM - 5:20AM AEST

 

Reducing Data Loss Risk with Everyone Working Remote and Adopting Cloud Apps

--------------------------------------------------------------------------------

Join us in this panel where users of the Proofpoint platform will share how they
adopted a people-centric approach to data loss and insider threat and were able
to reduce the risk associated with their data. 

5:20AM - 5:25AM AEST

Break

5:25AM - 5:55AM AEST

 

Practitioner's session: Using the Proofpoint Platform to Reduce Data Loss

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to put into production
Proofpoint's Data Loss Prevention platform. 

5:55AM - 6:00AM AEST

Closing Session

3:00AM - 3:05AM AEST

Welcome to Protect - Day 2

3:05AM - 3:35AM AEST

Roadmap + Vision: Defending Against Email Threats Targeting Your People

3:35AM - 3:40AM AEST

Break

3:40AM - 4:10AM AEST

Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss

4:10AM - 4:15AM AEST

Break

4:15AM - 4:45AM AEST

 

Countering the Attacker's Platform with the Proofpoint Platform

--------------------------------------------------------------------------------

Join us in this panel where Proofpoint users will share their journey adopting
and growing their Proofpoint Threat Protection platform - from protecting
against email threats, making their end users resilient, fighting against cloud
delivered threats.

4:45AM - 4:50AM AEST

Break

4:50AM - 5:20AM AEST

 

Expanding Defenses with Email Authentication

--------------------------------------------------------------------------------

Join this customer session to learn why and how they implemented email
authentication to address the concerns of email impersonation, BEC attacks,
supplier risk and application email hygiene aimed at employees, customers and
partners.

5:20AM - 5:25AM AEST

Break

5:25AM - 5:55AM AEST

 

Practitioner's session: Using the Proofpoint platform to defend against threats

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to counter the attacker's
platform and protect your users over email and the cloud. 

5:55AM - 6:00AM AEST

Closing Session

3:00AM - 3:05AM AEST

Welcome to Protect - Day 2

3:05AM - 3:35AM AEST

 

Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap

--------------------------------------------------------------------------------

When the next decade of workplace communications relies solely on digital
collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for
Financial Services and regulated organizations to understand how Proofpoint is
staying ahead with you for maximum Compliance and Legal protection

3:35AM - 3:40AM AEST

Break

3:40AM - 4:10AM AEST

 

Compliance & Legal Trends in 2022

--------------------------------------------------------------------------------

In the current ever-changing business landscape, join us to learn from industry
experts and Proofpoint specialists as they discuss views on Compliance and Legal
trends in 2022 and beyond.

4:10AM - 4:15AM AEST

Break

4:15AM - 4:45AM AEST

 

Regulatory Guidance on Compliance

--------------------------------------------------------------------------------

Join us for a session with a regulatory industry expert to discuss best
practices on how regulated organizations monitor and supervise business
communications while protecting critical corporate data from insider threats.

4:45AM - 4:50AM AEST

Break

4:50AM - 5:20AM AEST

 

Technologies Impacting Litigation Readiness

--------------------------------------------------------------------------------

Join us for a session with an experienced legal expert to discuss trends and
best practices on building a sound corporate legal protection strategy for
organizations with high exposure to litigations.

5:20AM - 5:25AM AEST

Break

5:25AM - 5:55AM AEST

 

Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to maximize the impact of your
Proofpoint Compliance Platform.

5:55AM - 6:00AM AEST

Closing Session

3:00AM - 3:05AM AEST

Welcome to Protect - Day 2

3:05AM - 3:35AM AEST

 

Voice of the CISO report

--------------------------------------------------------------------------------

Learn what key challenges are facing CISOs across the globe as we unveil the
findings of the 2022 Voice of the CISO report. The survey explores three key
areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels
of employee and organizational preparedness to face them, and the impact of
supporting a hybrid workforce as businesses prepare to re-open their corporate
offices. It also covers the challenges CISOs face in their roles, position
amongst the C-suite, and business expectations of their teams.

3:35AM - 3:40AM AEST

Break

3:40AM - 4:10AM AEST

 

What’s Next in People-Centric Security: Roadmap and Overview for Nexus People
Risk Explorer (NPRE)

--------------------------------------------------------------------------------

Understanding your people-centric risk allows one to better plan and reduce your
organization's risk posture. Join us in this session as we discuss with
customers how they leverage the Proofpoint Nexus People Risk Explorer to
understand risk and activate processes to reduce risk exposure.

4:10AM - 4:15AM AEST

Break

4:15AM - 4:45AM AEST

 

Strategies for Board Engagement

--------------------------------------------------------------------------------

Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to
elevate the profile of the CISO. The CISO now has a leadership voice and must
use it to instill confidence at the highest levels of the organization and as
the foremost executive on the front lines against the threat of systemic risk. A
single cyber event can have devastating consequences on an organization's
ability to deliver its operational value.  CISOs need to have identified the
potential ‘showstopper’ risks for their enterprise and ensure that the Board
understands the position. Learn from veteran Board members about their journey
to the Board room and expectations for understanding cyber risk. 
 

4:45AM - 4:50AM AEST

Break

4:50AM - 5:20AM AEST

 

Regulatory landscape in 2022

--------------------------------------------------------------------------------

Managing data privacy risk in a dynamic regulatory environment is challenging.
Compounding that is the fact that you have to defend your regulated data against
threats inside and outside the organization.  You need to put in “appropriate”
or “reasonable” security measures, but it is up to you to develop them. Join us
for a critical fireside chat with Global regulators. 

5:20AM - 5:25AM AEST

Break

5:25AM - 5:55AM AEST

 

CISO perspective on cyber insurance

--------------------------------------------------------------------------------

Cyber insurance is designed to transfer risks to the insurer. For insurers to be
profitable, they must have a fundamental grasp of the risks facing organizations
and shifts in the threat landscape. As work becomes increasingly flexible and
more solutions move to the cloud, protecting organizations is increasingly
challenging.

Despite the challenges, Cyber Insurance exists for organizations to help address
residual risk. Many organizations are faced with exponential premium increases
as they try to understand what cyber insurance actually covers, while others are
forced to renew due to contractual obligations or decide to self-insure. This
environment creates confusion as organizations ask: does cyber insurance
provides risk mitigation or just a measured level of resilience?

5:55AM - 6:00AM AEST

Closing Session

May 17 | Tue May 18 | Wed

DAY 1

1:00AM - 1:10AM

Protect Opening Message

1:10AM - 1:25AM

 

Proofpoint Welcome Keynote with Ashan Willy, CEO

--------------------------------------------------------------------------------

Ashan will provide a company update and share exciting announcements on our
people-centric innovations to help you mitigate security and compliance risks.

1:25AM - 1:50AM

 

Customer Panel - Protecting Against the Threat and Risk Actor's Platform

--------------------------------------------------------------------------------

Phishing, ransomware, BEC, account compromised suppliers… the list of tools
accessible to threat actors continues to both expand and integrate into the
modern attacker's platform. Join us in this panel of CISOs to discuss how they
counter the threat actor’s attack platform targeting their most valuable asset -
their people.

1:50AM - 2:00AM

Break and Updates

2:00AM - 2:25AM

 

Customer Panel - Reducing Risk in Information Loss and Cloud Threats

--------------------------------------------------------------------------------

With all that's changed in technology, data still doesn't lose itself -
malicious, compromised, or careless users lose it. A new people-centric approach
is needed to counter data loss - especially with employees working remote and
adopting cloud applications. Join this panel of CISOs as they discuss how they
counter data loss and reduce insider risk.

2:25AM - 2:55AM

 

The Proofpoint Platforms vs. The Attacker's Platform

--------------------------------------------------------------------------------

With risk continuing to converge around people, Proofpoint is helping you keep
pace with the visibility, effectiveness, and operational efficiency you need to
mitigate those risks. Join this session to hear about Proofpoint’s latest
innovations across our threat protection, information protection, and compliance
platforms.

2:55AM - 3:00AM

Break and Updates

3:00AM - 3:20AM

 

Guest Speaker

--------------------------------------------------------------------------------

Our Protect guest speaker will be announced shortly

3:20AM - 3:30AM

Closing Session

DAY 2

6:00PM - 9:00PM AEST

Content Tracks

Information Protection and Cloud Security Threat Protection Compliance CISO /
Thought Leadership

6:00PM - 6:05PM AEST

Welcome to Protect - Day 2

6:05PM - 6:35PM AEST

Roadmap + Vision: Defending Against Email Threats Targeting Your People

6:35PM - 6:40PM AEST

Break

6:40PM - 7:10PM AEST

Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss

7:10PM - 7:15PM AEST

Break

7:15PM - 7:45PM AEST

 

Solving Real Security Problems - Proofpoint Security Services Edge

--------------------------------------------------------------------------------

Proofpoint has integrated technologies such as CASB, SWG, RBI to address the
needs of cloud security into what we call Proofpoint Security Services Edge. But
let's put aside the technology acronym and join this panel of cloud security
experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is
uniquely able to solve them. 

7:45PM - 7:50PM AEST

Break

7:50PM - 8:20PM AEST

 

Reducing Data Loss Risk with Everyone Working Remote and Adopting Cloud Apps

--------------------------------------------------------------------------------

Join us in this panel where users of the Proofpoint platform will share how they
adopted a people-centric approach to data loss and insider threat and were able
to reduce the risk associated with their data. 

8:20PM - 8:25PM AEST

Break

8:25PM - 8:55PM AEST

 

Practitioner's session: Using the Proofpoint Platform to Reduce Data Loss

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to put into production
Proofpoint's Data Loss Prevention platform. 

8:55PM - 9:00PM AEST

Closing Session

6:00PM - 6:05PM AEST

Welcome to Protect - Day 2

6:05PM - 6:35PM AEST

Roadmap + Vision: Defending Against Email Threats Targeting Your People

6:35PM - 6:40PM AEST

Break

6:40PM - 7:10PM AEST

Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss

7:10PM - 7:15PM AEST

Break

7:15PM - 7:45PM AEST

 

Countering the Attacker's Platform with the Proofpoint Platform

--------------------------------------------------------------------------------

Join us in this panel where Proofpoint users will share their journey adopting
and growing their Proofpoint Threat Protection platform - from protecting
against email threats, making their end users resilient, fighting against cloud
delivered threats.

7:45PM - 7:50PM AEST

Break

7:50PM - 8:20PM AEST

 

Expanding Defenses with Email Authentication

--------------------------------------------------------------------------------

Join this customer session to learn why and how they implemented email
authentication to address the concerns of email impersonation, BEC attacks,
supplier risk and application email hygiene aimed at employees, customers and
partners.

8:20PM - 8:25PM AEST

Break

8:25PM - 8:55PM AEST

 

Practitioner's session: Using the Proofpoint platform to defend against threats

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to counter the attacker's
platform and protect your users over email and the cloud. 

8:55PM - 9:00PM AEST

Closing Session

6:00PM - 6:05PM AEST

Welcome to Protect - Day 2

6:05PM - 6:35PM AEST

 

Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap

--------------------------------------------------------------------------------

When the next decade of workplace communications relies solely on digital
collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for
Financial Services and regulated organizations to understand how Proofpoint is
staying ahead with you for maximum Compliance and Legal protection

6:35PM - 6:40PM AEST

Break

6:40PM - 7:10PM AEST

 

Compliance & Legal Trends in 2022

--------------------------------------------------------------------------------

In the current ever-changing business landscape, join us to learn from industry
experts and Proofpoint specialists as they discuss views on Compliance and Legal
trends in 2022 and beyond.

7:10PM - 7:15PM AEST

Break

7:15PM - 7:45PM AEST

 

Regulatory Guidance on Compliance

--------------------------------------------------------------------------------

Join us for a session with a regulatory industry expert to discuss best
practices on how regulated organizations monitor and supervise business
communications while protecting critical corporate data from insider threats.

7:45PM - 7:50PM AEST

Break

7:50PM - 8:20PM AEST

 

Technologies Impacting Litigation Readiness

--------------------------------------------------------------------------------

Join us for a session with an experienced legal expert to discuss trends and
best practices on building a sound corporate legal protection strategy for
organizations with high exposure to litigations.

8:20PM - 8:25PM AEST

Break

8:25PM - 8:55PM AEST

 

Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to maximize the impact of your
Proofpoint Compliance Platform.

8:55PM - 9:00PM AEST

Closing Session

6:00PM - 6:05PM AEST

Welcome to Protect - Day 2

6:05PM - 6:35PM AEST

 

Voice of the CISO report

--------------------------------------------------------------------------------

Learn what key challenges are facing CISOs across the globe as we unveil the
findings of the 2022 Voice of the CISO report. The survey explores three key
areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels
of employee and organizational preparedness to face them, and the impact of
supporting a hybrid workforce as businesses prepare to re-open their corporate
offices. It also covers the challenges CISOs face in their roles, position
amongst the C-suite, and business expectations of their teams.

6:05PM - 6:35PM AEST

Break

6:40PM - 7:10PM AEST

 

What’s Next in People-Centric Security: Roadmap and Overview for Nexus People
Risk Explorer (NPRE)

--------------------------------------------------------------------------------

Understanding your people-centric risk allows one to better plan and reduce your
organization's risk posture. Join us in this session as we discuss with
customers how they leverage the Proofpoint Nexus People Risk Explorer to
understand risk and activate processes to reduce risk exposure.

7:10PM - 7:15PM AEST

Break

7:15PM - 7:45PM AEST

 

Strategies for Board Engagement

--------------------------------------------------------------------------------

Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to
elevate the profile of the CISO. The CISO now has a leadership voice and must
use it to instill confidence at the highest levels of the organization and as
the foremost executive on the front lines against the threat of systemic risk. A
single cyber event can have devastating consequences on an organization's
ability to deliver its operational value.  CISOs need to have identified the
potential ‘showstopper’ risks for their enterprise and ensure that the Board
understands the position. Learn from veteran Board members about their journey
to the Board room and expectations for understanding cyber risk. 
 

7:45PM - 7:50PM AEST

Break

7:50PM - 8:20PM AEST

 

Regulatory landscape in 2022

--------------------------------------------------------------------------------

Managing data privacy risk in a dynamic regulatory environment is challenging.
Compounding that is the fact that you have to defend your regulated data against
threats inside and outside the organization.  You need to put in “appropriate”
or “reasonable” security measures, but it is up to you to develop them. Join us
for a critical fireside chat with Global regulators. 

8:20PM - 8:25PM AEST

Break

8:25PM - 8:55PM AEST

 

CISO perspective on cyber insurance

--------------------------------------------------------------------------------

Cyber insurance is designed to transfer risks to the insurer. For insurers to be
profitable, they must have a fundamental grasp of the risks facing organizations
and shifts in the threat landscape. As work becomes increasingly flexible and
more solutions move to the cloud, protecting organizations is increasingly
challenging.

Despite the challenges, Cyber Insurance exists for organizations to help address
residual risk. Many organizations are faced with exponential premium increases
as they try to understand what cyber insurance actually covers, while others are
forced to renew due to contractual obligations or decide to self-insure. This
environment creates confusion as organizations ask: does cyber insurance
provides risk mitigation or just a measured level of resilience?

8:55PM - 9:00PM AEST

Closing Session

May 17 | Tue May 18 | Wed

DAY 1

SESSION

6:00PM - 6:10PM AEST

Protect Opening Message

6:10PM - 6:25PM AEST

 

Proofpoint Welcome Keynote with Ashan Willy, CEO

--------------------------------------------------------------------------------

Ashan will provide a company update and share exciting announcements on our
people-centric innovations to help you mitigate security and compliance risks.

6:25PM - 6:50PM AEST

 

Customer Panel - Protecting Against the Threat and Risk Actor's Platform

--------------------------------------------------------------------------------

Phishing, ransomware, BEC, account compromised suppliers… the list of tools
accessible to threat actors continues to both expand and integrate into the
modern attacker's platform. Join us in this panel of CISOs to discuss how they
counter the threat actor’s attack platform targeting their most valuable asset -
their people.

6:50PM - 7:00PM AEST

Break and Updates

7:00PM - 7:25PM AEST

 

Customer Panel - Reducing Risk in Information Loss and Cloud Threats

--------------------------------------------------------------------------------

With all that's changed in technology, data still doesn't lose itself -
malicious, compromised, or careless users lose it. A new people-centric approach
is needed to counter data loss - especially with employees working remote and
adopting cloud applications. Join this panel of CISOs as they discuss how they
counter data loss and reduce insider risk.

7:25PM - 7:55PM AEST

 

The Proofpoint Platforms vs. The Attacker's Platform

--------------------------------------------------------------------------------

With risk continuing to converge around people, Proofpoint is helping you keep
pace with the visibility, effectiveness, and operational efficiency you need to
mitigate those risks. Join this session to hear about Proofpoint’s latest
innovations across our threat protection, information protection, and compliance
platforms.

7:55PM - 8:00PM AEST

Break and Updates

8:00PM - 8:20PM AEST

 

Guest Speaker

--------------------------------------------------------------------------------

Our Protect guest speaker will be announced shortly

8:20PM - 8:30PM AEST

Closing Session

DAY 2

SESSION

6:00PM - 9:00PM AEST

Content Tracks

Information Protection and Cloud Security Threat Protection Compliance CISO /
Thought Leadership

6:00PM - 6:05PM AEST

Welcome to Protect - Day 2

6:05PM - 6:35PM AEST

Roadmap + Vision: Defending Against Email Threats Targeting Your People

6:35PM - 6:40PM AEST

Break

6:40PM - 7:10PM AEST

Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss

7:10PM - 7:15PM AEST

Break

7:15PM - 7:45PM AEST

 

Solving Real Security Problems - Proofpoint Security Services Edge

--------------------------------------------------------------------------------

Proofpoint has integrated technologies such as CASB, SWG, RBI to address the
needs of cloud security into what we call Proofpoint Security Services Edge. But
let's put aside the technology acronym and join this panel of cloud security
experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is
uniquely able to solve them. 

7:45PM - 7:50PM AEST

Break

7:50PM - 8:20PM AEST

 

Reducing Data Loss Risk with Everyone Working Remote and Adopting Cloud Apps

--------------------------------------------------------------------------------

Join us in this panel where users of the Proofpoint platform will share how they
adopted a people-centric approach to data loss and insider threat and were able
to reduce the risk associated with their data. 

8:20PM - 8:25PM AEST

Break

8:25PM - 8:55PM AEST

 

Practitioner's session: Using the Proofpoint Platform to Reduce Data Loss

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to put into production
Proofpoint's Data Loss Prevention platform. 

8:55PM - 9:00PM AEST

Closing Session

6:00PM - 6:05PM AEST

Welcome to Protect - Day 2

6:05PM - 6:35PM AEST

Roadmap + Vision: Defending Against Email Threats Targeting Your People

6:35PM - 6:40PM AEST

Break

6:40PM - 7:10PM AEST

Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss

7:10PM - 7:15PM AEST

Break

7:15PM - 7:45PM AEST

 

Countering the Attacker's Platform with the Proofpoint Platform

--------------------------------------------------------------------------------

Join us in this panel where Proofpoint users will share their journey adopting
and growing their Proofpoint Threat Protection platform - from protecting
against email threats, making their end users resilient, fighting against cloud
delivered threats.

7:45PM - 7:50PM AEST

Break

7:50PM - 8:20PM AEST

 

Expanding Defenses with Email Authentication

--------------------------------------------------------------------------------

Join this customer session to learn why and how they implemented email
authentication to address the concerns of email impersonation, BEC attacks,
supplier risk and application email hygiene aimed at employees, customers and
partners.

8:20PM - 8:25PM AEST

Break

8:25PM - 8:55PM AEST

 

Practitioner's session: Using the Proofpoint platform to defend against threats

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to counter the attacker's
platform and protect your users over email and the cloud. 

8:55PM - 9:00PM AEST

Closing Session

6:00PM - 6:05PM AEST

Welcome to Protect - Day 2

6:05PM - 6:35PM AEST

 

Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap

--------------------------------------------------------------------------------

When the next decade of workplace communications relies solely on digital
collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for
Financial Services and regulated organizations to understand how Proofpoint is
staying ahead with you for maximum Compliance and Legal protection

6:35PM - 6:40PM AEST

Break

6:40PM - 7:10PM AEST

 

Compliance & Legal Trends in 2022

--------------------------------------------------------------------------------

In the current ever-changing business landscape, join us to learn from industry
experts and Proofpoint specialists as they discuss views on Compliance and Legal
trends in 2022 and beyond.

7:10PM - 7:15PM AEST

Break

7:15PM - 7:45PM AEST

 

Regulatory Guidance on Compliance

--------------------------------------------------------------------------------

Join us for a session with a regulatory industry expert to discuss best
practices on how regulated organizations monitor and supervise business
communications while protecting critical corporate data from insider threats.

7:45PM - 7:50PM AEST

Break

7:50PM - 8:20PM AEST

 

Technologies Impacting Litigation Readiness

--------------------------------------------------------------------------------

Join us for a session with an experienced legal expert to discuss trends and
best practices on building a sound corporate legal protection strategy for
organizations with high exposure to litigations.

8:20PM - 8:25PM AEST

Break

8:25PM - 8:55PM AEST

 

Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to maximize the impact of your
Proofpoint Compliance Platform.

8:55PM - 9:00PM AEST

Closing Session

6:00PM - 6:05PM AEST

Welcome to Protect - Day 2

6:05PM - 6:35PM AEST

 

Voice of the CISO report

--------------------------------------------------------------------------------

Learn what key challenges are facing CISOs across the globe as we unveil the
findings of the 2022 Voice of the CISO report. The survey explores three key
areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels
of employee and organizational preparedness to face them, and the impact of
supporting a hybrid workforce as businesses prepare to re-open their corporate
offices. It also covers the challenges CISOs face in their roles, position
amongst the C-suite, and business expectations of their teams.

6:05PM - 6:35PM AEST

Break

6:40PM - 7:10PM AEST

 

What’s Next in People-Centric Security: Roadmap and Overview for Nexus People
Risk Explorer (NPRE)

--------------------------------------------------------------------------------

Understanding your people-centric risk allows one to better plan and reduce your
organization's risk posture. Join us in this session as we discuss with
customers how they leverage the Proofpoint Nexus People Risk Explorer to
understand risk and activate processes to reduce risk exposure.

7:10PM - 7:15PM AEST

Break

7:15PM - 7:45PM AEST

 

Strategies for Board Engagement

--------------------------------------------------------------------------------

Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to
elevate the profile of the CISO. The CISO now has a leadership voice and must
use it to instill confidence at the highest levels of the organization and as
the foremost executive on the front lines against the threat of systemic risk. A
single cyber event can have devastating consequences on an organization's
ability to deliver its operational value.  CISOs need to have identified the
potential ‘showstopper’ risks for their enterprise and ensure that the Board
understands the position. Learn from veteran Board members about their journey
to the Board room and expectations for understanding cyber risk. 
 

7:45PM - 7:50PM AEST

Break

7:50PM - 8:20PM AEST

 

Regulatory landscape in 2022

--------------------------------------------------------------------------------

Managing data privacy risk in a dynamic regulatory environment is challenging.
Compounding that is the fact that you have to defend your regulated data against
threats inside and outside the organization.  You need to put in “appropriate”
or “reasonable” security measures, but it is up to you to develop them. Join us
for a critical fireside chat with Global regulators. 

8:20PM - 8:25PM AEST

Break

8:25PM - 8:55PM AEST

 

CISO perspective on cyber insurance

--------------------------------------------------------------------------------

Cyber insurance is designed to transfer risks to the insurer. For insurers to be
profitable, they must have a fundamental grasp of the risks facing organizations
and shifts in the threat landscape. As work becomes increasingly flexible and
more solutions move to the cloud, protecting organizations is increasingly
challenging.

Despite the challenges, Cyber Insurance exists for organizations to help address
residual risk. Many organizations are faced with exponential premium increases
as they try to understand what cyber insurance actually covers, while others are
forced to renew due to contractual obligations or decide to self-insure. This
environment creates confusion as organizations ask: does cyber insurance
provides risk mitigation or just a measured level of resilience?

8:55PM - 9:00PM AEST

Closing Session

May 18 | Wed May 19 | Thu

DAY 1

7:00PM - 7:10PM

Protect Opening Message

7:10PM - 7:25PM

 

Proofpoint Welcome Keynote with Ashan Willy, CEO

--------------------------------------------------------------------------------

Ashan will provide a company update and share exciting announcements on our
people-centric innovations to help you mitigate security and compliance risks.

7:25PM - 7:50PM

 

Customer Panel - Protecting Against the Threat and Risk Actor's Platform

--------------------------------------------------------------------------------

Phishing, ransomware, BEC, account compromised suppliers… the list of tools
accessible to threat actors continues to both expand and integrate into the
modern attacker's platform. Join us in this panel of CISOs to discuss how they
counter the threat actor’s attack platform targeting their most valuable asset -
their people.

7:50PM - 8:00PM

Break and Updates

8:00PM - 8:25PM

 

Customer Panel - Reducing Risk in Information Loss and Cloud Threats

--------------------------------------------------------------------------------

With all that's changed in technology, data still doesn't lose itself -
malicious, compromised, or careless users lose it. A new people-centric approach
is needed to counter data loss - especially with employees working remote and
adopting cloud applications. Join this panel of CISOs as they discuss how they
counter data loss and reduce insider risk.

8:25PM - 8:55PM

 

The Proofpoint Platforms vs. The Attacker's Platform

--------------------------------------------------------------------------------

With risk continuing to converge around people, Proofpoint is helping you keep
pace with the visibility, effectiveness, and operational efficiency you need to
mitigate those risks. Join this session to hear about Proofpoint’s latest
innovations across our threat protection, information protection, and compliance
platforms.

8:55PM - 9:00PM

Break and Updates

9:00PM - 9:20PM

 

Guest Speaker

--------------------------------------------------------------------------------

Our Protect guest speaker will be announced shortly

9:20PM - 9:30PM

Closing Session

DAY 2

12:00PM - 3:00PM AEST

Content Tracks

Information Protection and Cloud Security Threat Protection Compliance CISO /
Thought Leadership

12:00PM - 12:05PM AEST

Welcome to Protect - Day 2

12:05PM - 12:35PM AEST

Roadmap + Vision: Defending Against Email Threats Targeting Your People

12:35PM - 12:40PM AEST

Break

12:40PM - 1:10PM AEST

Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss

1:10PM - 1:15PM AEST

Break

1:15PM - 1:45PM AEST

 

Solving Real Security Problems - Proofpoint Security Services Edge

--------------------------------------------------------------------------------

Proofpoint has integrated technologies such as CASB, SWG, RBI to address the
needs of cloud security into what we call Proofpoint Security Services Edge. But
let's put aside the technology acronym and join this panel of cloud security
experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is
uniquely able to solve them. 

1:45PM - 1:50PM AEST

Break

1:50PM - 2:20PM AEST

 

Reducing Data Loss Risk with Everyone Working Remote and Adopting Cloud Apps

--------------------------------------------------------------------------------

Join us in this panel where users of the Proofpoint platform will share how they
adopted a people-centric approach to data loss and insider threat and were able
to reduce the risk associated with their data. 

2:20PM - 2:25PM AEST

Break

2:25PM - 2:55PM AEST

 

Practitioner's session: Using the Proofpoint Platform to Reduce Data Loss

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to put into production
Proofpoint's Data Loss Prevention platform. 

2:55PM - 3:00PM AEST

Closing Session

12:00PM - 12:05PM AEST

Welcome to Protect - Day 2

12:05PM - 12:35PM AEST

Roadmap + Vision: Defending Against Email Threats Targeting Your People

12:35PM - 12:40PM AEST

Break

12:40PM - 1:10PM AEST

Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss

1:10PM - 1:15PM AEST

Break

1:15PM - 1:45PM AEST

 

Countering the Attacker's Platform with the Proofpoint Platform

--------------------------------------------------------------------------------

Join us in this panel where Proofpoint users will share their journey adopting
and growing their Proofpoint Threat Protection platform - from protecting
against email threats, making their end users resilient, fighting against cloud
delivered threats.

1:45PM - 1:50PM AEST

Break

1:50PM - 2:20PM AEST

 

Expanding Defenses with Email Authentication

--------------------------------------------------------------------------------

Join this customer session to learn why and how they implemented email
authentication to address the concerns of email impersonation, BEC attacks,
supplier risk and application email hygiene aimed at employees, customers and
partners.

2:20PM - 2:25PM AEST

Break

2:25PM - 2:55PM AEST

 

Practitioner's session: Using the Proofpoint platform to defend against threats

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to counter the attacker's
platform and protect your users over email and the cloud. 

2:55PM - 3:00PM AEST

Closing Session

12:00PM - 12:05PM AEST

Welcome to Protect - Day 2

12:05PM - 12:35PM AEST

 

Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap

--------------------------------------------------------------------------------

When the next decade of workplace communications relies solely on digital
collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for
Financial Services and regulated organizations to understand how Proofpoint is
staying ahead with you for maximum Compliance and Legal protection

12:35PM - 12:40PM AEST

Break

12:40PM - 1:10PM AEST

 

Compliance & Legal Trends in 2022

--------------------------------------------------------------------------------

In the current ever-changing business landscape, join us to learn from industry
experts and Proofpoint specialists as they discuss views on Compliance and Legal
trends in 2022 and beyond.

1:10PM - 1:15PM AEST

Break

1:15PM - 1:45PM AEST

 

Regulatory Guidance on Compliance

--------------------------------------------------------------------------------

Join us for a session with a regulatory industry expert to discuss best
practices on how regulated organizations monitor and supervise business
communications while protecting critical corporate data from insider threats.

1:45PM - 1:50PM AEST

Break

1:50PM - 2:20PM AEST

 

Technologies Impacting Litigation Readiness

--------------------------------------------------------------------------------

Join us for a session with an experienced legal expert to discuss trends and
best practices on building a sound corporate legal protection strategy for
organizations with high exposure to litigations.

2:20PM - 2:25PM AEST

Break

2:25PM - 2:55PM AEST

 

Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to maximize the impact of your
Proofpoint Compliance Platform.

2:55PM - 3:00PM AEST

Closing Session

12:00PM - 12:05PM AEST

Welcome to Protect - Day 2

12:05PM - 12:35PM AEST

 

Voice of the CISO report

--------------------------------------------------------------------------------

Learn what key challenges are facing CISOs across the globe as we unveil the
findings of the 2022 Voice of the CISO report. The survey explores three key
areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels
of employee and organizational preparedness to face them, and the impact of
supporting a hybrid workforce as businesses prepare to re-open their corporate
offices. It also covers the challenges CISOs face in their roles, position
amongst the C-suite, and business expectations of their teams.

12:35PM - 12:40PM AEST

Break

12:40PM - 1:10PM AEST

 

What’s Next in People-Centric Security: Roadmap and Overview for Nexus People
Risk Explorer (NPRE)

--------------------------------------------------------------------------------

Understanding your people-centric risk allows one to better plan and reduce your
organization's risk posture. Join us in this session as we discuss with
customers how they leverage the Proofpoint Nexus People Risk Explorer to
understand risk and activate processes to reduce risk exposure.

1:10PM - 1:15PM AEST

Break

1:15PM - 1:45PM AEST

 

Strategies for Board Engagement

--------------------------------------------------------------------------------

Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to
elevate the profile of the CISO. The CISO now has a leadership voice and must
use it to instill confidence at the highest levels of the organization and as
the foremost executive on the front lines against the threat of systemic risk. A
single cyber event can have devastating consequences on an organization's
ability to deliver its operational value.  CISOs need to have identified the
potential ‘showstopper’ risks for their enterprise and ensure that the Board
understands the position. Learn from veteran Board members about their journey
to the Board room and expectations for understanding cyber risk. 
 

1:45PM - 1:50PM AEST

Break

1:50PM - 2:20PM AEST

 

Regulatory landscape in 2022

--------------------------------------------------------------------------------

Managing data privacy risk in a dynamic regulatory environment is challenging.
Compounding that is the fact that you have to defend your regulated data against
threats inside and outside the organization.  You need to put in “appropriate”
or “reasonable” security measures, but it is up to you to develop them. Join us
for a critical fireside chat with Global regulators. 

2:20PM - 2:25PM AEST

Break

2:25PM - 2:55PM AEST

 

CISO perspective on cyber insurance

--------------------------------------------------------------------------------

Cyber insurance is designed to transfer risks to the insurer. For insurers to be
profitable, they must have a fundamental grasp of the risks facing organizations
and shifts in the threat landscape. As work becomes increasingly flexible and
more solutions move to the cloud, protecting organizations is increasingly
challenging.

Despite the challenges, Cyber Insurance exists for organizations to help address
residual risk. Many organizations are faced with exponential premium increases
as they try to understand what cyber insurance actually covers, while others are
forced to renew due to contractual obligations or decide to self-insure. This
environment creates confusion as organizations ask: does cyber insurance
provides risk mitigation or just a measured level of resilience?

2:55PM - 3:00PM AEST

Closing Session

May 18 | Wed May 19 | Thu

DAY 1

SESSION

12:00PM - 12:10PM AEST

Protect Opening Message

12:10PM - 12:25PM AEST

 

Proofpoint Welcome Keynote with Ashan Willy, CEO

--------------------------------------------------------------------------------

Ashan will provide a company update and share exciting announcements on our
people-centric innovations to help you mitigate security and compliance risks.

12:25PM - 12:50PM AEST

 

Customer Panel - Protecting Against the Threat and Risk Actor's Platform

--------------------------------------------------------------------------------

Phishing, ransomware, BEC, account compromised suppliers… the list of tools
accessible to threat actors continues to both expand and integrate into the
modern attacker's platform. Join us in this panel of CISOs to discuss how they
counter the threat actor’s attack platform targeting their most valuable asset -
their people.

12:50PM - 1:00PM AEST

Break and Updates

1:00PM - 1:25PM AEST

 

Customer Panel - Reducing Risk in Information Loss and Cloud Threats

--------------------------------------------------------------------------------

With all that's changed in technology, data still doesn't lose itself -
malicious, compromised, or careless users lose it. A new people-centric approach
is needed to counter data loss - especially with employees working remote and
adopting cloud applications. Join this panel of CISOs as they discuss how they
counter data loss and reduce insider risk.

1:25PM - 1:55PM AEST

 

The Proofpoint Platforms vs. The Attacker's Platform

--------------------------------------------------------------------------------

With risk continuing to converge around people, Proofpoint is helping you keep
pace with the visibility, effectiveness, and operational efficiency you need to
mitigate those risks. Join this session to hear about Proofpoint’s latest
innovations across our threat protection, information protection, and compliance
platforms.

1:55PM - 2:00PM AEST

Break and Updates

2:00PM - 2:20PM AEST

 

Guest Speaker

--------------------------------------------------------------------------------

Our Protect guest speaker will be announced shortly

2:20PM - 2:30PM AEST

Closing Session

DAY 2

SESSION

12:00PM - 3:00PM AEST

Content Tracks

Information Protection and Cloud Security Threat Protection Compliance CISO /
Thought Leadership

12:00PM - 12:05PM AEST

Welcome to Protect - Day 2

12:05PM - 12:35PM AEST

Roadmap + Vision: Defending Against Email Threats Targeting Your People

12:35PM - 12:40PM AEST

Break

12:40PM - 1:10PM AEST

Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss

1:10PM - 1:15PM AEST

Break

1:15PM - 1:45PM AEST

 

Solving Real Security Problems - Proofpoint Security Services Edge

--------------------------------------------------------------------------------

Proofpoint has integrated technologies such as CASB, SWG, RBI to address the
needs of cloud security into what we call Proofpoint Security Services Edge. But
let's put aside the technology acronym and join this panel of cloud security
experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is
uniquely able to solve them. 

1:45PM - 1:50PM AEST

Break

1:50PM - 2:20PM AEST

 

Reducing Data Loss Risk with Everyone Working Remote and Adopting Cloud Apps

--------------------------------------------------------------------------------

Join us in this panel where users of the Proofpoint platform will share how they
adopted a people-centric approach to data loss and insider threat and were able
to reduce the risk associated with their data. 

2:20PM - 2:25PM AEST

Break

2:25PM - 2:55PM AEST

 

Practitioner's session: Using the Proofpoint Platform to Reduce Data Loss

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to put into production
Proofpoint's Data Loss Prevention platform. 

2:55PM - 3:00PM AEST

Closing Session

12:00PM - 12:05PM AEST

Welcome to Protect - Day 2

12:05PM - 12:35PM AEST

Roadmap + Vision: Defending Against Email Threats Targeting Your People

12:35PM - 12:40PM AEST

Break

12:40PM - 1:10PM AEST

Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss

1:10PM - 1:15PM AEST

Break

1:15PM - 1:45PM AEST

 

Countering the Attacker's Platform with the Proofpoint Platform

--------------------------------------------------------------------------------

Join us in this panel where Proofpoint users will share their journey adopting
and growing their Proofpoint Threat Protection platform - from protecting
against email threats, making their end users resilient, fighting against cloud
delivered threats.

1:45PM - 1:50PM AEST

Break

1:50PM - 2:20PM AEST

 

Expanding Defenses with Email Authentication

--------------------------------------------------------------------------------

Join this customer session to learn why and how they implemented email
authentication to address the concerns of email impersonation, BEC attacks,
supplier risk and application email hygiene aimed at employees, customers and
partners.

2:20PM - 2:25PM AEST

Break

2:25PM - 2:55PM AEST

 

Practitioner's session: Using the Proofpoint platform to defend against threats

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to counter the attacker's
platform and protect your users over email and the cloud. 

2:55PM - 3:00PM AEST

Closing Session

12:00PM - 12:05PM AEST

Welcome to Protect - Day 2

12:05PM - 12:35PM AEST

 

Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap

--------------------------------------------------------------------------------

When the next decade of workplace communications relies solely on digital
collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for
Financial Services and regulated organizations to understand how Proofpoint is
staying ahead with you for maximum Compliance and Legal protection

12:35PM - 12:40PM AEST

Break

12:40PM - 1:10PM AEST

 

Compliance & Legal Trends in 2022

--------------------------------------------------------------------------------

In the current ever-changing business landscape, join us to learn from industry
experts and Proofpoint specialists as they discuss views on Compliance and Legal
trends in 2022 and beyond.

1:10PM - 1:15PM AEST

Break

1:15PM - 1:45PM AEST

 

Regulatory Guidance on Compliance

--------------------------------------------------------------------------------

Join us for a session with a regulatory industry expert to discuss best
practices on how regulated organizations monitor and supervise business
communications while protecting critical corporate data from insider threats.

1:45PM - 1:50PM AEST

Break

1:50PM - 2:20PM AEST

 

Technologies Impacting Litigation Readiness

--------------------------------------------------------------------------------

Join us for a session with an experienced legal expert to discuss trends and
best practices on building a sound corporate legal protection strategy for
organizations with high exposure to litigations.

2:20PM - 2:25PM AEST

Break

2:25PM - 2:55PM AEST

 

Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products

--------------------------------------------------------------------------------

Join us for a technical, hands-on session on how to maximize the impact of your
Proofpoint Compliance Platform.

2:55PM - 3:00PM AEST

Closing Session

12:00PM - 12:05PM AEST

Welcome to Protect - Day 2

12:05PM - 12:35PM AEST

 

Voice of the CISO report

--------------------------------------------------------------------------------

Learn what key challenges are facing CISOs across the globe as we unveil the
findings of the 2022 Voice of the CISO report. The survey explores three key
areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels
of employee and organizational preparedness to face them, and the impact of
supporting a hybrid workforce as businesses prepare to re-open their corporate
offices. It also covers the challenges CISOs face in their roles, position
amongst the C-suite, and business expectations of their teams.

12:35PM - 12:40PM AEST

Break

12:40PM - 1:10PM AEST

 

What’s Next in People-Centric Security: Roadmap and Overview for Nexus People
Risk Explorer (NPRE)

--------------------------------------------------------------------------------

Understanding your people-centric risk allows one to better plan and reduce your
organization's risk posture. Join us in this session as we discuss with
customers how they leverage the Proofpoint Nexus People Risk Explorer to
understand risk and activate processes to reduce risk exposure.

1:10PM - 1:15PM AEST

Break

1:15PM - 1:45PM AEST

 

Strategies for Board Engagement

--------------------------------------------------------------------------------

Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to
elevate the profile of the CISO. The CISO now has a leadership voice and must
use it to instill confidence at the highest levels of the organization and as
the foremost executive on the front lines against the threat of systemic risk. A
single cyber event can have devastating consequences on an organization's
ability to deliver its operational value.  CISOs need to have identified the
potential ‘showstopper’ risks for their enterprise and ensure that the Board
understands the position. Learn from veteran Board members about their journey
to the Board room and expectations for understanding cyber risk. 
 

1:45PM - 1:50PM AEST

Break

1:50PM - 2:20PM AEST

 

Regulatory landscape in 2022

--------------------------------------------------------------------------------

Managing data privacy risk in a dynamic regulatory environment is challenging.
Compounding that is the fact that you have to defend your regulated data against
threats inside and outside the organization.  You need to put in “appropriate”
or “reasonable” security measures, but it is up to you to develop them. Join us
for a critical fireside chat with Global regulators. 

2:20PM - 2:25PM AEST

Break

2:25PM - 2:55PM AEST

 

CISO perspective on cyber insurance

--------------------------------------------------------------------------------

Cyber insurance is designed to transfer risks to the insurer. For insurers to be
profitable, they must have a fundamental grasp of the risks facing organizations
and shifts in the threat landscape. As work becomes increasingly flexible and
more solutions move to the cloud, protecting organizations is increasingly
challenging.

Despite the challenges, Cyber Insurance exists for organizations to help address
residual risk. Many organizations are faced with exponential premium increases
as they try to understand what cyber insurance actually covers, while others are
forced to renew due to contractual obligations or decide to self-insure. This
environment creates confusion as organizations ask: does cyber insurance
provides risk mitigation or just a measured level of resilience?

2:55PM - 3:00PM AEST

Closing Session


INTERESTED IN LEARNING MORE ABOUT SECURITY AWARENESS?

Join us May 19, 2022 for Wisdom 2022.

Learn More


ABOUT

 * Overview
 * Careers
 * Leadership Team
 * News Center
 * Nexus Platform


THREAT CENTER

 * Human Factor Report
 * Threat Glossary
 * Daily Ruleset


PRODUCTS

 * Email Protection
 * Advanced Threat Protection
 * Archive & Compliance
 * Information Protection
 * Digital Risk Protection


RESOURCES

 * White Papers
 * Webinars
 * Data Sheets
 * Customer Stories
 * Blog
 * Free Trial


CONNECT

 * +61 2 8378 4250
 * Contact Us
 * Office Locations
 * Request a Demo


SUPPORT

 * Support Login
 * Support Services
 * IP Address Blocked?

 * Facebook
 * Twitter
 * linkedin
 * Youtube

 * United States
 * United Kingdom
 * France
 * Germany
 * Italy
 * Spain
 * Japan
 * Australia

© 2022. All rights reserved. Terms and conditions Privacy Policy Sitemap